from small one page howto to huge articles all in one place

search text in:




Other .linuxhowtos.org sites:gentoo.linuxhowtos.org



Last additions:
using iotop to find disk usage hogs

using iotop to find disk usage hogs

words:

887

views:

209586

userrating:


May 25th. 2007:
Words

486

Views

258592

why adblockers are bad


Workaround and fixes for the current Core Dump Handling vulnerability affected kernels

Workaround and fixes for the current Core Dump Handling vulnerability affected kernels

words:

161

views:

149883

userrating:


April, 26th. 2006:

Druckversion
You are here: manpages





SLOGVERIFY

Section: The slogverify manual page (1)
Updated: 07/16/2025
Index Return to Main Contents
 

NAME

slogverify - Verify cryptographically secured logs  

SYNOPSIS

slogverify [options] [input file] [output file] [buffers]
 

DESCRIPTION

The slogverify utility is used to verify the integrity of cryptographically secured logs and to decrypt log entries produced in a syslog-ng secure logging environment.

Normal mode: slogverify -k <host key file> -m <input MAC file> <input file> <output file> [buffers]

Iterative mode: slogverify -i -p <previous host key> -r <previous MAC> -m <current MAC> <input file> <output file> [buffers]  

ARGUMENTS

input file

An encrypted log file from the syslog-ng secure logging environment that will be verified.

output file

The file that will contain the plain text log entries after decryption and verification.

buffers

Optional number of input buffers. The number of buffers can be used for performance adjustments in case the log file to be verified is very large and cannot be processed at once. It is a positive number of log entries that can be held in memory during verification. The minimum number if 10 and the maximum number is 4294967295. If this argument is not supplied the default of 1000 is used.
 

OPTIONS

--iterative or -i

Iterative mode. This is useful in case the log files are periodically copied from the system on which they where generated to central collector. As log rotation, i.e. overwriting log files in order to preserve space cannot be done in a secure logging environment, the iterative mode can be used instead. This works as follows: If a certain storage limit is reached the log file together with the host key and the MAC file is copied to new destination and the old file is deleted. The verification is then performed in iterations, i.e. separately for each file that was retrieved from the log host. For this to work, it is important to always retrieve the corresponding host key and MAC files. The process can be automated, e.g. by calling slogverify in iterative mode from a script.

--key-file or -k

The initial host key (k0). This option is used in normal mode only.

--mac-file or -m

The current MAC file used.

--prev-key-file or -p

The host key corresponding to the previous log file. This option can be used in iterative mode only. In theory, this can be initial host key (k0) but using this key might generate warnings, as the gap between the first log entry ever (log entry 0) and the first log entry of the current log file might be large.

--prev-mac-file or -r

The MAC file from the previous log file. This option can only be used in iterative mode.

--help or -h

Display a help message.
 

FILES

/usr/bin/slogverify

/etc/syslog-ng.conf  

SEE ALSO

syslog-ng.conf(5)

secure-logging(7)


Note

For the detailed documentation of see m[blue]The syslog-ng Administrator Guidem[][1]

If you experience any problems or need help with syslog-ng, visit the m[blue]syslog-ng mailing listm[][2].

For news and notifications about of syslog-ng, visit the m[blue]syslog-ng blogsm[][3].

For specific information requests related to secure logging send a mail to the Airbus Secure Logging Team <secure-logging@airbus.com>.

 

AUTHOR

This manual page was written by the Airbus Secure Logging Team <secure-logging@airbus.com>.  

COPYRIGHT

 

NOTES

1.
The syslo-ng Administrator Guide
https://www.balabit.com/documents/syslo-n-os-lates-guides/en/syslo-n-os-guid-admin/html/index.html
2.
syslo-ng mailing list
https://lists.balabit.hu/mailman/listinfo/syslo-ng
3.
syslo-ng blogs
https://syslo-ng.org/blogs/


 

Index

NAME
SYNOPSIS
DESCRIPTION
ARGUMENTS
OPTIONS
FILES
SEE ALSO
AUTHOR
COPYRIGHT
NOTES





Support us on Content Nation
rdf newsfeed | rss newsfeed | Atom newsfeed
- Powered by LeopardCMS - Running on Gentoo -
Copyright 2004-2025 Sascha Nitsch Unternehmensberatung GmbH
Valid XHTML1.1 : Valid CSS
- Level Triple-A Conformance to Web Content Accessibility Guidelines 1.0 -
- Copyright and legal notices -
Time to create this page: 13.5 ms